|
1.Klein, D. “Foiling the cracker: A survey of, and improvements to, password security.” In Proceedings of the 2nd USENIX Security Symposium, 1990. 2.Van Oorschot, P. C. and Thorpe, J. “On predictive models and user-drawn graphical passwords. ACM Trans. Inform. Syst. Secur. 10, 4, Article 17, Jan. 2008. 3.Blonder, G. E. “Graphical passwords” United States Patent 5559961, 1996. 4.Suo, X., Zhu, Y., and Owen, G. S. “Graphical passwords: A survey.” In 21st Annual Computer Security Applications Conference(ACSAC) (Dec.5-9), 2005. 5.Jermyn, I., Mayer, A., Monrose, F., Reiter, M., and Rubin, A. “The design and analysis of graphical passwords.” In 8th USENIX Security Symposium, 1999. 6.Syukri, A. F., Okamoto, E. and Mambo, M. “A User Identification System Using System Using Signature Written with Mouse”, in 3rd Australasian Conference on Information Security and Privacy (ACISP): Springer-Verlag Lecture Notes in Computer Sience (1438), pp. 403-441, 1998. 7.Goldberg, J., Hagman, J., and Sazawal, V. “ Doodling our way to better authentication.” In Conference on Human Factor and Computing Systems (April 20-25). ACM Press, New York.868-869. CHI’ 02 extended abstracts on Human Factors in Computer Systems, 2002. 8.Tao, H. “Pass-Go, a New Graphical Password Scheme.” M. S. thesis, School of Information Technology and Engineering, University of Ottawa, Canada, 2006. 9.Real User Corporation. “About passfaces.” http://www.passfaces.com/, site accessed April 22, 2008. 10.Davis, D., Monrose, F., and Reiter, M. “On user choice in graphical password scheme.” In 13th USENIX Security Symposium, 2004. 11.Dhamija, R., 2000. “Hash visualization in user authentication.” In Proceedings of CHI 2000. ACM Press, New York, pp.279-280, 2000. 12.Dhamija, R. and Perrig, A. “ Deja Vu: A user study using images for authentication.” In 9th USENIX Security Symposium, 2000. 13.Perrig, A. and Song D. “Hash visualization: A new technique to improve real-world security.” In International Workshop on Cryptography Techniques and E-Commerce. 131-138, 1999. 14.Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., and Memon, N. “PassPoints: Design and longitudinal evaluation of a graphical password system.” International J. of Human-Computer Studies (Special Issue on HCI Research in Privacy and Security) 63, 102-127, 2005. 15.Nali, D. and Thorpe, J. “Analyzing user choice in Graphical passwords.” Tech Report TR-04-01, School of Computer Science, Carleton University, Canada, 2004. 16.Thorpe, J. and Van Oorschot, P. “On the Security of Graphical Password Schemes (Extended Version).” Tech Report TR-05-11, School of Computer Science, Carleton University, Canada, http://www.scs.carleton.ca/research/tech_repots/2005 /download/TR-05-11.pdf. 17.Thorpe, J. and Van Oorschot, P. “Graphical dictionaries and the memorable space of graphical passwords.” In 13th USENIX Security Symposium, 2004a (Aug.9-13). 18.Thorpe, J. and Van Oorschot, P. “Towards secure design choices for implementing graphical passwords.” In 20th Annual Computer Security Applications Conference(ACSAC2004) (Dec.6-10), IEEE, Los Alamitos CA., 2004b. 19.Tyler, C. “Human symmetry perception.” In Human Symmetry Perception and Its Computational Analysis, C. Tyler, Ed. VSP, The Netherlands. 3-22, 1996. 20.Wagemans, J. “Detection of Visual Symmetries.” In Human Symmetry Perception and its Computational Analysis, C. Tyler, Ed. VSP, The Netherlands. 25-48, 1996. 21.Birget, J. C., Hong, D., and Memon, N. “Graphical passwords based on robust discretization.” IEEE Transactions on Information Forensics and Security 1, 3, 395-399, Sept. 2003. 22.Halderman, J. A., Waters B., and Felten, E. W. “A convenient method for securely managing passwords.” In Proceedings of the 14th International World Wide Web Conference. ACM Press, New York. 471-479, 2005. 23.Jansen, W., Gavrilla, S., Korolev, V., Ayers, R., and R. S. “Picture password: A visual login technique for mobile devices.” NIST Report – NISTIR7030, 2003. 24.Menezes, A. J., Van Oorschot, P. C., and Vanstone, S. A. “Handbook of applied cryptography.” CRC Press , Boca Raton, FL. 290-291. Note 8.8., 1996. 25.Pinkas, B. and Sander, T. “ Securing passwords against dictionary attacks .” In 9th ACM Conference on Computer and Communications Security, ACM Press, 161-170, 2002. 26.Provos, N. and Mazieres, D. “A future-adaptable password scheme.” In Proceedings of the USENIX Annual Technical Conference, 1999. 27.Stubblebine, S., and Van Oorschot, P. “Addressing online dictionary attacks with login histories and humans-in-the–loop.” In Financial Cryptography ''04. Springer-Verlag LNCS (to appear), 2004. 28.Van Oorschot, P. C. and Stubblebine, S. “On countering online dictionary attacks with login histories and humans-in-the–loop.” ACM TISSEC 9, 3 (Aug.), 235-258, 2006.
|